[keycloak-user] KeycloakConfigResolver vs. unprotected resources

Bystrik Horvath bystrik.horvath at gmail.com
Mon Feb 1 10:06:45 EST 2016


Hi Bill,
thank you for response. I use Adapter deployed in Keycloak 1.7.0. So I need
then somehow propagate the list of unprotected (or protected) resources to
the KeycloakConfigResolver implementation by my own and return from
resolve(...) method when unprotected URIs is accessed.

Best regards,
Bystrik

On Mon, Feb 1, 2016 at 3:26 PM, Bill Burke <bburke at redhat.com> wrote:

> Depends on the adapter.  Some/most platforms, the authenticator gets
> executed irregardless.
>
> On 2/1/2016 4:08 AM, Bystrik Horvath wrote:
>
> Hello,
>
> I have an application that is part of several realms. That's why I
> implemented the KeycloakConfigResolver and it works fine.
> I observed that the KeycloakConfigResolver implementation gets called even
> when unprotected resources of the application are requested. Is there a
> (recommended) way how to avoid it? Or do I do something wrong?
>
> Thank you for the answer.
>
> Best regards,
> Bystrik
>
>
> _______________________________________________
> keycloak-user mailing listkeycloak-user at lists.jboss.orghttps://lists.jboss.org/mailman/listinfo/keycloak-user
>
>
> --
> Bill Burke
> JBoss, a division of Red Hathttp://bill.burkecentral.com
>
>
> _______________________________________________
> keycloak-user mailing list
> keycloak-user at lists.jboss.org
> https://lists.jboss.org/mailman/listinfo/keycloak-user
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.jboss.org/pipermail/keycloak-user/attachments/20160201/ac592cbb/attachment.html 


More information about the keycloak-user mailing list